关注
David Wilson
David Wilson
在 byu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A picture is worth a thousand words: Source credibility theory applied to logo and website design for heightened credibility and consumer trust
PB Lowry, DW Wilson, WL Haig
International Journal of Human-Computer Interaction 30 (1), 63-93, 2014
3352014
Overview and guidance on agile development in large organizations
JB Barlow, JS Giboney, MJ Keith, DW Wilson, RM Schuetzler, PB Lowry, ...
Communications of the Association for Information Systems, 2011
2792011
Evaluating journal quality and the association for information systems senior scholars' journal basket via bibliometric measures: Do expert journal assessments add value?
PB Lowry, J Gaskin, SL Humpherys, GD Moody, DF Galletta, JB Barlow, ...
MIS quarterly, 993-1012, 2013
2452013
Unpacking the privacy paradox: Irrational decision-making within the privacy calculus
D Wilson, JS Valacich
1542012
Web 2.0: A definition, literature review, and directions for future research
DW Wilson, X Lin, P Longstreet, S Sarker
1092011
Mitigating biodiversity impacts associated with solar and wind energy development. Synthesis and key messages
L Bennun, J Van Bochove, C Ng, C Fletcher, D Wilson, N Phair, ...
by: IUCN, Gland, Switzerland and The Biodiversity Consultancy, Cambridge, UK, 2021
922021
Patterns of Nonverbal Behavior Associated with Truth and Deception
JK Burgoon, J Proudfoot, DW Wilson, RS Schuetzler
Journal of Nonverbal Behavior, 2014
572014
Kinesic patterning in deceptive and truthful interactions
JK Burgoon, R Schuetzler, D W Wilson
Journal of Nonverbal Behavior 39, 1-24, 2015
422015
Saving face on Facebook: privacy concerns, social benefits, and impression management
D Wilson, J Proudfoot, J Valacich
362014
Serious games: An evaluation framework and case study
DW Wilson, J Jenkins, N Twyman, M Jensen, JS Valacich, N Dunbar, ...
Hawaii International Conference on System Sciences, 2016
262016
Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations
A Vance, P Benjamin Lowry, DW Wilson
Security Journal 30, 979-999, 2017
182017
Mitigating cognitive bias through the use of serious games: Effects of feedback
NE Dunbar, ML Jensen, CH Miller, E Bessarabova, SK Straub, SN Wilson, ...
Persuasive Technology: 9th International Conference, PERSUASIVE 2014, Padua …, 2014
172014
Development and application of a self-report measure for assessing sensitive information disclosures across multiple modes
MD Pickard, D Wilson, CA Roster
Behavior research methods 50, 1734-1748, 2018
162018
Interactive deception in group decision-making: new insights from communication pattern analysis
JK Burgoon, D Wilson, M Hass, R Schuetzler
Discovering Hidden Temporal Patterns in Behavior and Interaction: T-Pattern …, 2016
132016
Measurement and outcomes of identity communication in virtual teams
SA Brown, SB Thatcher, DW Wilson
Hawaii International Conference on System Sciences, 2016
132016
When disclosure is involuntary: Empowering users with control to reduce concerns
DW Wilson, RM Schuetzler, B Dorn, JG Proudfoot
92015
Examining Predictors and Outcomes of Identity Communication in Virtual Teams.
DW Wilson, SA Brown, SMB Thatcher
ECIS, 2015
52015
Media capabilities that support identity communication in virtual teams
DW Wilson, SMB Thatcher, SA Brown
2015 48th Hawaii International Conference on System Sciences, 702-711, 2015
42015
Identity communication in virtual teams: Insights from interviews with working professionals
D Wilson, S Brown, S Thatcher, S Harris
'^'eds.'): Book Identity Communication in Virtual Teams: Insights from …, 2015
32015
Mobile computing and collaboration
JS Valacich, CA Looney, RT Wright, DW Wilson
Collaboration Systems, 143-164, 2015
22015
系统目前无法执行此操作,请稍后再试。
文章 1–20